Monday, April 28, 2025
HomeCyber Security NewsTelegram Gained 3 Million New Users During Facebook Outage

Telegram Gained 3 Million New Users During Facebook Outage

Published on

SIEM as a Service

Follow Us on Google News

Facebook outage period turn profitable for Telegram, within 24 hours the instant messaging app gained more than 3 million new users.

Telegram is a free instant messaging app like WhatsApp, well-known for its encryption, privacy, and self-destructive private messages. With Telegram, you can access your messages across multiple devices.

With Telegram, all your messages, media, etc are encrypted using a combination of 256-bit symmetric AES encryption, 2048-bit RSA encryption, and Diffie–Hellman secure key exchange. Telegram runs on user donation’s and the company claims it will never sell ads or monetize users’ data.

- Advertisement - Google News

You will get the maximum privacy with Telegram Secret Chats, that programmed to get self-destruct automatically from both participating devices.

Telegram Founder and CEO Pavel Durov, confirmed this Thursday that more 3 million new users have joined Telegram during the historic Facebook outage.

instant messaging

Facebook Outage

Billions of user’s affected as the social media service Instagram, Whatsapp and Facebook experienced a historic outage. Officials from Facebook claimed that Facebook down due to the internal glitch and it is also affected other Facebook-owned platforms Instagram and WhatsApp.

Facebook said that ” We’re aware that some people are currently having trouble accessing the Facebook family of apps. We’re working to resolve the issue as soon as possible.

The outage affected users in the US, Europe, South America, Australia, and Asia. The outage also affected the Facebook Owned virtual reality company Oculus.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Master in Wireshark Network Analysis to keep your self-updated.

Also Read:

Telegram Leaks Public & Private IP Address While Making Calls

Russian Telecom Blocks 50 VPNs & Proxy Services that used to Access Telegram

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

How To Use Digital Forensics To Strengthen Your Organization’s Cybersecurity Posture

Digital forensics has become a cornerstone of modern cybersecurity strategies, moving beyond its traditional...

Building A Strong Compliance Framework: A CISO’s Guide To Meeting Regulatory Requirements

In the current digital landscape, Chief Information Security Officers (CISOs) are under mounting pressure...

Two Systemic Jailbreaks Uncovered, Exposing Widespread Vulnerabilities in Generative AI Models

Two significant security vulnerabilities in generative AI systems have been discovered, allowing attackers to...

New AI-Generated ‘TikDocs’ Exploits Trust in the Medical Profession to Drive Sales

AI-generated medical scams across TikTok and Instagram, where deepfake avatars pose as healthcare professionals...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

How To Use Digital Forensics To Strengthen Your Organization’s Cybersecurity Posture

Digital forensics has become a cornerstone of modern cybersecurity strategies, moving beyond its traditional...

Building A Strong Compliance Framework: A CISO’s Guide To Meeting Regulatory Requirements

In the current digital landscape, Chief Information Security Officers (CISOs) are under mounting pressure...

Two Systemic Jailbreaks Uncovered, Exposing Widespread Vulnerabilities in Generative AI Models

Two significant security vulnerabilities in generative AI systems have been discovered, allowing attackers to...